Focused on protecting corporate information as your workforce goes mobile, this CISO Handbook explains:
- A 5-point plan to extend an enterprise-grade security framework to iPhone and iPad
- Latest strategies for device security and configuration controls
- Tactics for employee-owned devices
- Deploying mobile applications while protecting corporate data
- Ensuring mobile compliance and governance
- Extending ITSM/ITIL to Mobility
Related Items
pdf Network Security in the Age of *Any* Computing
pdf Mobile Security and Risk Management
pdf Mobile security compliance for personal device use and apps
pdf Mobile Risk Management: Executive Overview
pdf IDC Report: Architecting a Flexible Bring Your Own Device Strategy